Vulnerability Name:

CVE-2017-7675 (CCN-130247)

Assigned:2017-08-10
Published:2017-08-10
Updated:2019-06-12
Summary:The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M21 and 8.5.0 to 8.5.15 bypassed a number of security checks that prevented directory traversal attacks. It was therefore possible to bypass security constraints using a specially crafted URL.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-22
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2017-7675

Source: DEBIAN
Type: UNKNOWN
DSA-3974

Source: CCN
Type: IBM Security Bulletin S1010742 (Storwize V7000 Unified (2073))
Vulnerabilities in Apache Tomcat affect IBM Storwize V7000 Unified (CVE-2017-7674, CVE-2017-7675)

Source: CCN
Type: IBM Security Bulletin S1010747 (Scale Out Network Attached Storage)
Vulnerabilities in Apache Tomcat affect IBM SONAS (CVE-2017-7674, CVE-2017-7675)

Source: CCN
Type: IBM Security Bulletin 2008478 (Algo One)
Vulnerability in Apache Tomcat affects IBM Algo One - Algo Risk Application (CVE-2017-7674, CVE-2017-7675)

Source: CCN
Type: IBM Security Bulletin 2008830 (Algo One)
Vulnerability in Apache Tomcat affects IBM Algo One - Core (CVE-2017-7674, CVE-2017-7675)

Source: CCN
Type: IBM Security Bulletin 2010463 (Algo One)
Open Source Apache Tomcat Vulnerabilities affect Algo One - Counterparty Credit Risk

Source: CCN
Type: IBM Security Bulletin 2017032 (WebSphere Cast Iron Cloud integration)
IBM WebSphere Cast Iron Solution is affected by Tomcat vulnerabilities

Source: CCN
Type: IBM Security Bulletin C1000302 (UrbanCode Deploy)
Multiple Vulnerabilities in Apache Tomcat affects IBM UrbanCode Deploy (CVE-2017-7674, CVE-2017-7675)

Source: BID
Type: Third Party Advisory, VDB Entry
100256

Source: CCN
Type: BID-100256
Apache Tomcat CVE-2017-7675 Directory Traversal Vulnerability

Source: XF
Type: UNKNOWN
apache-tomcat-cve20177675-sec-bypass(130247)

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20190415 svn commit: r1857582 [18/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20190325 svn commit: r1856174 [23/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20190612 [Bug 61120] Tomcat 8.5.15 with HTTP/2: URL path parameters lost

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/

Source: CCN
Type: Apache Web site
CVE-2017-7675 Apache Tomcat Security Constraint

Source: MLIST
Type: Mailing List, Vendor Advisory
[announce] 20170810 [UPDATE][SECURITY] CVE-2017-7675 Apache Tomcat Security Constraint Bypass

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20190413 svn commit: r1857496 [3/4] - in /tomcat/site/trunk: ./ docs/ xdocs/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20190319 svn commit: r1855831 [24/30] - in /tomcat/site/trunk: ./ docs/ xdocs/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20200203 svn commit: r1873527 [25/30] - /tomcat/site/trunk/docs/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20200213 svn commit: r1873980 [29/34] - /tomcat/site/trunk/docs/

Source: CONFIRM
Type: UNKNOWN
https://security.netapp.com/advisory/ntap-20180614-0003/

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apache:tomcat:8.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.5.5:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.5.6:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.5.7:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.5.8:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.5.9:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.5.10:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.5.11:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.5.12:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.5.13:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.5.14:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.5.15:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:9.0.0:m1:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:9.0.0:m10:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:9.0.0:m11:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:9.0.0:m12:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:9.0.0:m13:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:9.0.0:m14:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:9.0.0:m15:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:9.0.0:m16:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:9.0.0:m17:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:9.0.0:m18:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:9.0.0:m19:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:9.0.0:m2:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:9.0.0:m20:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:9.0.0:m21:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:9.0.0:m3:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:9.0.0:m4:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:9.0.0:m5:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:9.0.0:m6:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:9.0.0:m7:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:9.0.0:m8:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:9.0.0:m9:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:apache:tomcat:9.0.0:m1:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.5.0:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:9.0.0:m21:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:8.5.15:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:urbancode_deploy:6.1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:algo_one:4.9.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:algo_one:5.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:algo_one:4.9.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.1.8:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:algo_one:5.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:storwize_v7000_unified_software:1.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.3.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.1.3.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.4.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.4.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.2.5.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.trusty:def:20177675000
    V
    CVE-2017-7675 on Ubuntu 14.04 LTS (trusty) - medium.
    2017-08-10
    oval:com.ubuntu.xenial:def:20177675000
    V
    CVE-2017-7675 on Ubuntu 16.04 LTS (xenial) - medium.
    2017-08-10
    oval:com.ubuntu.xenial:def:201776750000000
    V
    CVE-2017-7675 on Ubuntu 16.04 LTS (xenial) - medium.
    2017-08-10
    BACK
    apache tomcat 8.5.0
    apache tomcat 8.5.1
    apache tomcat 8.5.2
    apache tomcat 8.5.3
    apache tomcat 8.5.4
    apache tomcat 8.5.5
    apache tomcat 8.5.6
    apache tomcat 8.5.7
    apache tomcat 8.5.8
    apache tomcat 8.5.9
    apache tomcat 8.5.10
    apache tomcat 8.5.11
    apache tomcat 8.5.12
    apache tomcat 8.5.13
    apache tomcat 8.5.14
    apache tomcat 8.5.15
    apache tomcat 9.0.0 m1
    apache tomcat 9.0.0 m10
    apache tomcat 9.0.0 m11
    apache tomcat 9.0.0 m12
    apache tomcat 9.0.0 m13
    apache tomcat 9.0.0 m14
    apache tomcat 9.0.0 m15
    apache tomcat 9.0.0 m16
    apache tomcat 9.0.0 m17
    apache tomcat 9.0.0 m18
    apache tomcat 9.0.0 m19
    apache tomcat 9.0.0 m2
    apache tomcat 9.0.0 m20
    apache tomcat 9.0.0 m21
    apache tomcat 9.0.0 m3
    apache tomcat 9.0.0 m4
    apache tomcat 9.0.0 m5
    apache tomcat 9.0.0 m6
    apache tomcat 9.0.0 m7
    apache tomcat 9.0.0 m8
    apache tomcat 9.0.0 m9
    apache tomcat 9.0.0 m1
    apache tomcat 8.5.0
    apache tomcat 9.0.0 m21
    apache tomcat 8.5.15
    ibm urbancode deploy 6.1.0.2
    ibm algo one 4.9.0
    ibm algo one 5.0.0
    ibm algo one 4.9.1
    ibm urbancode deploy 6.1
    ibm urbancode deploy 6.1.0.1
    ibm urbancode deploy 6.1.0.3
    ibm urbancode deploy 6.1.0.4
    ibm urbancode deploy 6.1.1
    ibm urbancode deploy 6.1.1.1
    ibm urbancode deploy 6.1.1.2
    ibm urbancode deploy 6.1.1.3
    ibm urbancode deploy 6.1.1.4
    ibm urbancode deploy 6.1.1.5
    ibm urbancode deploy 6.1.1.6
    ibm urbancode deploy 6.1.1.7
    ibm urbancode deploy 6.1.2
    ibm urbancode deploy 6.1.1.8
    ibm urbancode deploy 6.1.3
    ibm urbancode deploy 6.1.3.1
    ibm urbancode deploy 6.2
    ibm urbancode deploy 6.2.0.1
    ibm algo one 5.1.0
    ibm storwize unified v7000 software 1.6
    ibm urbancode deploy 6.1.3.2
    ibm urbancode deploy 6.2.0.2
    ibm urbancode deploy 6.2.1
    ibm urbancode deploy 6.2.1.1
    ibm urbancode deploy 6.1.3.3
    ibm urbancode deploy 6.2.1.2
    ibm urbancode deploy 6.2.2
    ibm urbancode deploy 6.2.2.1
    ibm urbancode deploy 6.2.3.0
    ibm urbancode deploy 6.2.3.1
    ibm urbancode deploy 6.1.3.4
    ibm urbancode deploy 6.1.3.5
    ibm urbancode deploy 6.2.4
    ibm urbancode deploy 6.1.3.6
    ibm urbancode deploy 6.2.4.1
    ibm urbancode deploy 6.2.4.2
    ibm urbancode deploy 6.2.5
    ibm urbancode deploy 6.2.5.1